Movatterモバイル変換


[0]ホーム

URL:


US12407651B2 - Inline inspection cybersecurity enforcement of multipart file transmissions - Google Patents

Inline inspection cybersecurity enforcement of multipart file transmissions

Info

Publication number
US12407651B2
US12407651B2US18/170,084US202318170084AUS12407651B2US 12407651 B2US12407651 B2US 12407651B2US 202318170084 AUS202318170084 AUS 202318170084AUS 12407651 B2US12407651 B2US 12407651B2
Authority
US
United States
Prior art keywords
file
multipart
transmission
message
cybersecurity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US18/170,084
Other versions
US20240283775A1 (en
Inventor
Zihang Xiao
Lexuan Sun
Mengying Jiang
Li Meng
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Palo Alto Networks Inc
Original Assignee
Palo Alto Networks Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Palo Alto Networks IncfiledCriticalPalo Alto Networks Inc
Priority to US18/170,084priorityCriticalpatent/US12407651B2/en
Assigned to PALO ALTO NETWORKS, INC.reassignmentPALO ALTO NETWORKS, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: JIANG, Mengying, MENG, Li, SUN, Lexuan, XIAO, ZIHANG
Priority to PCT/US2024/013115prioritypatent/WO2024173021A1/en
Priority to CN202480012806.4Aprioritypatent/CN120693841A/en
Publication of US20240283775A1publicationCriticalpatent/US20240283775A1/en
Application grantedgrantedCritical
Publication of US12407651B2publicationCriticalpatent/US12407651B2/en
Activelegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

Separating awareness of multipart file transmissions of different applications from traffic handling at a granularity of an individual application layer session facilitates efficient cybersecurity enforcement on multipart file transmissions. A protocol-based multipart file transmission regulator (“regulator”) determines a per session message handling action to prevent completion of a multipart file transmission based on a protocol of an application identified for the session until cybersecurity analysis can be performed. The regulator then communicates the message handling action to a network component supporting the session. The regulator maintains information and file chunks in a data store for active sessions and determines with the data store whether a condition for requesting cybersecurity analysis for a multipart file transmission is satisfied. Upon obtaining a cybersecurity analysis verdict, the regulator provides the verdict or a verdict based instruction to the network component that ensures the multipart file transmission is compliant with a cybersecurity policy(ies).

Description

BACKGROUND
The disclosure generally relates to transmission of digital information (e.g., CPC class H04L) and network architectures or network communication protocols for managing network security (e.g., subclass H04L63/20).
Multiple companies provide file management solutions that involve the upload and download of large files. These are also referred to as file storage services and cloud storage services. Different services may utilize software components that implement different protocols for multipart file transmission (i.e., transmitting different parts or “chunks” of files across multiple sessions). A client component on a sending endpoint will divide a file into chunks and transmit different chunks in different sessions (i.e., application layer sessions) established with a recipient endpoint.
A network cybersecurity component (e.g., a firewall, security access proxy, secure web proxy) processes network traffic to identify cybersecurity threats and identify violations of a cybersecurity policy. When processing network traffic corresponding to a multipart file transmission, the network cybersecurity component collects file chunks and metadata to reassemble the file for cybersecurity analysis.
BRIEF DESCRIPTION OF THE DRAWINGS
Embodiments of the disclosure may be better understood by referencing the accompanying drawings.
FIGS.1A-1B are diagrams of an example system for efficiently enforcing cybersecurity compliance of multipart file transmissions.FIG.1A depicts example components of the system andFIG.1B depicts example operation of these components.
FIG.2 is a flowchart of example operations for ensuring cybersecurity policy compliance of multipart file transmissions.
FIG.3 is a flowchart of example operations for generating a message handling indication for a message intercepted in an application layer session of a multipart file transmission based on determining an action to prevent completion of the multipart file transmission.
FIG.4 is a flowchart of example operations for updating a data store of multipart file transmission states based on an intercepted message.
FIG.5 depicts an example computer system with a protocol-based multipart file transmission regulator.
DESCRIPTION
The description that follows includes example systems, methods, techniques, and program flows to aid in understanding the disclosure and not to limit claim scope. Well-known instruction instances, protocols, structures, and techniques have not been shown in detail for conciseness.
Overview
A policy can be defined for one or more cybersecurity aspects, examples of which include data loss/leakage prevention (DLP), threat detection, and intrusion detection. For cybersecurity policy compliance, a file is analyzed to detect malware and/or detect sensitive information. Performing cybersecurity analysis for a multipart file transmission on a network component residing between the transmission endpoints (i.e., an intermediary network component) can introduce delay which impacts user experience. In addition, a network component that is handling network traffic and performing cybersecurity analysis at the application layer will have a higher compute resource requirement to perform both functions and to attempt to reduce the introduced delay. While a network component may already inspect and/or analyze packets or datagrams, some cybersecurity analysis analyzes a more comprehensive view of transmitted data (e.g., a message or document instead of a packet payload carrying a portion of the message or document). Moreover, the varying protocols implemented for multipart file transmission by applications increases the complexity of a network component for recognizing and handling traffic with different behaviors due to the different protocols.
Separating tracking states of multipart file transmissions of different applications from traffic handling at a granularity of an individual session facilitates cybersecurity enforcement on multipart file transmissions while preserving the efficiency of inline inspection. A protocol-based multipart file transmission regulator determines a per session message handling action to prevent completion of a multipart file transmission based on a protocol of an application identified for the session until cybersecurity analysis can be performed. The protocol-based multipart file transmission regulator then communicates the message handling action to a network component supporting the session. The protocol-based multipart file transmission regulator maintains information and file chunks in a data store for active sessions and determines with the data store whether a condition for requesting cybersecurity analysis for a multipart file transmission is satisfied. Upon obtaining a cybersecurity analysis verdict, the protocol-based multipart file transmission regulator provides the verdict or a verdict based instruction to the network component that ensures the multipart file transmission is compliant with a cybersecurity policy(ies). The program logic (hardware and/or software) that implements a “protocol-based multipart file transmission regulator” can be modularized by functionality. For example, determining a relevant protocol and message handling can be implemented as a first program while tracking states of multipart file transmissions and submission of a file/chunk for analysis can be implemented as a second program.
Example Illustrations
FIGS.1A-1B are diagrams of an example system for efficiently enforcing cybersecurity compliance of multipart file transmissions.FIG.1A depicts example components of the system andFIG.1B depicts example operation of these components.FIG.1A depicts a sender endpoint103 transmitting a file to a receiver endpoint105 via a firewall101 and a network151 (e.g., the Internet).FIG.1A further depicts components107 of the firewall101 that interact with a protocol-based file transmission regulator123 to enforce compliance of multipart file transmissions with a cybersecurity policy(ies). The protocol-based multipart file transmission regulator123 uses a data store125 of protocol information for various protocols of different applications relating to multipart file transmission and a data store127 to track states of multipart file transmissions. The protocol-based multipart file transmission regulator123 (hereinafter “regulator”) submits files and/or file chunks to a security analysis service129 to obtain a verdict.
The sender endpoint103 and the recipient endpoint105 are application layer components of an application that offers a cloud-based solution(s) for file storage and/or management (e.g., Software-as-a-Service (SaaS), Storage-as-a-Service (STaaS)). The illustrated endpoints103,105 represent client and server components (e.g., threads, processes, modules) of the application and not a device. The illustrated endpoints103,105 reside (logically) above other communications layers (e.g., transport layer, network layer) that are not depicted to avoid unnecessarily complicating the diagram. The endpoints103,105 implement a protocol of the application for a multipart file transmission131 that includes multiple application layer sessions. The sender endpoint103 breaks a file into file chunks (“chunks”) and transmits the chunks in different sessions.FIG.1A illustrates the multipart file transmission131 including a session133 in which a last chunk will be transmitted.FIG.1A only illustrates data sessions (i.e., sessions transmitting chunks), but some multipart file transmissions include control sessions that signal start of a multipart file transmission and completion of a multipart file transmission. In addition, some protocols implemented for multipart file transmission will communicate metadata for reassembly of a file in the data sessions while others will communicate reassembly metadata in a control session(s) or in both a control session and data sessions.
The firewall101 processes incoming traffic119 at a network and/or transport layer (i.e., processes packets) and forward packets as outgoing traffic121 according to configurations and policies installed on the firewall101. InFIG.1A, the multipart file transmission131 is part of the traffic119,121, depending upon policy compliance.FIG.1A depicts firewall components107 as including traffic processing109, application identifier113, content inspector115, and policy engine117. Traffic processing109 includes logic (i.e., software and/hardware) for packet forwarding according to rules and policies enforced with information from the application identifier113, content inspector115, and the policy engine117. The application identifier113 attempts to identify an application with traffic in a lower layer session (i.e., a session of a layer below the application layer) and the content inspector115 inspects traffic content (e.g., datagram payloads or packet payloads) for cybersecurity threats. The policy engine117 identifies a relevant policy to apply to corresponding traffic based on identification of an application by the application identifier117. The policy engine117 also identifies cybersecurity policy(ies) to apply based on inspection results by the content inspector115 and/or guides the content inspector115 (e.g., identifying uniform resource locators (URLs) to filter). These components113,115,117 provide information to traffic processing109 for policy compliance.
Reference is made to these firewall components107 and the protocol-based multipart file transmission regulator123 to describe example operation of the system for cybersecurity policy compliance for multipart file transmissions.FIG.1B is annotated with a series of letters A-F. Instead of a single stage C, stages C1-C2 are depicted due to the possible variations in timing relative to each other. Likewise, stages D1-D2 are illustrated instead of a single stage D. Each stage represents one or more operations. The stages illustrate one example to aid in understanding this disclosure and should not be used to limit the claims. Subject matter falling within the scope of the claims can vary from what is illustrated.
At stage A, the firewall101 notifies the protocol-based multipart file transmission regulator123 that an application corresponding to multipart file transmission has been identified based on analysis by the application identifier113 and the content inspector115. For example, the content inspector115 performs HyperText Transfer Protocol (HTTP) decoding after application identification by the application identifier113 to detect a HTTP message that relates to a multipart file transmission. This can involve the content inspector115 extracting payloads from a lower layer session to form the message and then decoding the message according to the relevant protocol. The firewall101 communicates the detected message (“intercepted message”) and application identifier to the protocol-based multipart file transmission regulator123.
At stage B, the protocol-based multipart file transmission regulator123 selects application layer protocol information from the data store125 based on the application identifier communicated from the firewall101 to process the intercepted message. With the protocol information, the protocol-based multipart file transmission regulator123 can parse the message and extract metadata that identifies the multipart file transmission (e.g., a download or upload identifier), and that identifies the application layer session in which the message was intercepted. Further, the protocol-based multipart file transmission regulator123 can determine whether the intercepted message carries a chunk and extract the chunk. The metadata of the message may also provide information for file reassembly (e.g., metadata describing the chunk as chunk 2 of 3). A firewall will likely observe traffic of different applications having different protocols for multipart file transmissions. The protocol-based multipart file transmission regulator123 uses the data store125 (e.g., a configuration file) with information for these different application protocols. If the protocol-based multipart file transmission regulator123 is distinct from the firewall101, this protocol knowledge can be maintained without increasing the resource demands of the firewall101.
Stages C1-C2 are stages of operations performed based on selecting the protocol information corresponding to the intercepted message. Implementations can initiate these in any order and can perform them concurrently. At stage C1, the protocol-based multipart file transmission regulator123 provides a messaging handling indication to prevent completion of the multipart file transmission corresponding to the intercepted message. The message handling indication is based on the protocol information selected based on the intercepted message and application identifier communicated in stage A. The message handling indication will indicate that the intercepted message can be allowed or should be stalled. The indication depends upon the protocol and configuration. If completion of the multipart file transmission can be prevented by stalling transmission of a last file chunk or a complete control message and the intercepted message is that control message or carries that last file chunk, then message handling indication will indicate (e.g., with a flag or command) to stall the intercepted message. If the intercepted message does not carry the last file chunk or is not a complete control message, then the message handling file indication will indicate that the intercepted message (i.e., the packets or datagrams carrying payloads that form the intercepted message) can be transmitted to the recipient endpoint or at least transmitted from the firewall101.
At stage D1, the firewall101 updates session records111 to stall transmission of the intercepted message if indicated in the message handling indication from the protocol-based multipart file transmission regulator123. Stage D1 occurs subsequent to stage C1 since it is dependent upon the message handling indication, but can occur concurrently or asynchronously with respect to stages C2 and D2. For the depicted implementation of a firewall, updating the session records111 involves the traffic processing component109 accessing a network and/or transport layer session (“layer 3/4 session”) record indicated by the content inspector115 and setting a field to prevent the firewall101 from forwarding network traffic of the session corresponding to the selected record. The content inspector115 (in this example architecture) determines the lower layer session corresponding to the application layer session of the intercepted message. In some cases, an application layer session relies on multiple lower layer sessions. In these cases, the content inspector115 will map the application layer session to the n lower layer sessions and indicate to the traffic processing component111 the n layer 3/4 session records to update to stall transmission of the intercepted message. If the message handling indication indicates that the intercepted message should be allowed to pass the firewall, the relevant record(s) in the session records111 is updated accordingly.
At stage C2, the protocol-based multipart file transmission regulator123 updates the data store127 with information about the multipart file transmission of a file based on the intercepted message. The protocol-based multipart file transmission regulator123 maintains the data store127 to track progress or state of multipart file transmissions. The protocol-based multipart file transmission regulator123 has visibility of multipart file transmissions traversing the firewall101 and possibly other network components. When the protocol-based multipart file transmission regulator123 receives an intercepted message, the visibility is from the intercepted message (i.e., a partial view of the multipart file transmission). Maintaining the data store127 with information (e.g., chunks, chunk metadata, session metadata) of an intercepted message and/or about a corresponding application layer session allows for correlation of the chunk and/or metadata of the intercepted message with other entries in the data store127 to obtain a comprehensive view of a multipart file transmission. If a chunk was extracted from the intercepted message, then the protocol-based multipart file transmission regulator123 inserts the chunk into the data store127 indexed or retrievable by an identifier that identifies the multipart file transmission to facilitate correlation of chunks from different sessions. The multipart file transmission identifier depends on the corresponding protocol. For example, the protocol-based multipart file transmission regulator123 may extract a multipart file transmission identifier from the intercepted message and correlate other messages with the identifier. or construct the identifier from a combination of a file identifier and an application layer session identifier. As another example, a file identifier in combination with endpoint identifiers may be used to identify a multipart file transmission.
At stage D2, the protocol-based multipart file transmission regulator123 determines whether a security analysis condition is satisfied for a multipart file transmission based on information in the data store127. Stage D2 is performed after the update of stage C2, but is asynchronous with respect to stage D1. After updating the data store127, the protocol-based multipart file transmission regulator123 queries the data store127 with the multipart file transmission identifier determined from the intercepted message. With the information in the data store127, the protocol-based multipart file transmission regulator123 can correlate chunks and/or metadata from different application layer sessions. For instance, the query returns the recent update and any other entries having in common the multipart file transmission identifier. The condition for security analysis depends upon the selected protocol information and configuration of the protocol-based multipart file transmission regulator123 and/or policy configuration of a customer corresponding to the firewall101. Configuration indicates a granularity for obtaining security analysis verdicts (e.g., verdicts of files, chunks, or both), and this may vary by firewall, customer, and/or protocol. If configured for chunk or both file and chunk granularity analysis, then the condition for security analysis is the availability of a chunk. For file granularity analysis, the condition is capability to reassemble a file (i.e., availability of chunks to reassemble a file).
At stage E, the protocol-based multipart file transmission regulator123 obtains a security analysis verdict for a file and/or chunk depending upon the result of stage D2. Assuming the security analysis service129 is distinct from the protocol-based multipart file transmission regulator123, the protocol-based multipart file transmission regulator123 submits the chunk and/or file to the security analysis service129. The security analysis service129 analyzes the chunk and/or file for malware and/or violation of a DLP policy.
At stage F, the protocol-based multipart file transmission regulator123 communicates the obtained verdict and/or a completion indication for the multipart file transmission based on the verdict. The protocol-based multipart file transmission regulator123 can be configured to provide the verdict alone and allow further action to be decided upon independent of the protocol-based multipart file transmission regulator123. In this case, a stalled message(s) will remain stalled unless other action is taken, for example by a user. The firewall101 can be configured to release stalled traffic based on receipt of a benign verdict. If configured to provide a completion indication, the protocol-based multipart file transmission regulator123 communicates an indication to the firewall101 that completion of the multipart file transmission should be prevented if the verdict is negative (i.e., verdict of malicious or cybersecurity policy non-compliance). For a benign verdict, the protocol-based multipart file transmission regulator123 is configured to communicate an indication to the firewall101 to allow completion of the multipart file transmission. An implementation that communicates a verdict alone allows the protocol-based multipart file transmission regulator123 to be agnostic with respect to how the firewall101 allows or prevents completion of the multipart file transmission. An implementation that communicates a completion indication allows for flexibility in extent of delegation or division of labor with respect to how completion or prevention is handled.
FIGS.1A-1B present a limited view of the numerous possible architectural and deployment implementations possible for the disclosed technology for efficiently securing multipart file transmissions.FIGS.2-3 are flowcharts of operations that are more general than the example illustrated inFIGS.1A-1B. While the flowcharts are based on separation of multipart file transmission regulation from the traffic handling and security analysis, deployment of corresponding program code can vary (e.g., different devices, virtual machines, etc.).
FIG.2 is a flowchart of example operations for ensuring cybersecurity policy compliance of multipart file transmissions. For consistency withFIGS.1A-1B, the operations are described with reference to a multipart file transmission regulator as performing the operations.
At block203, a multipart file transmission regulator selects protocol information of an application identified for an application layer session corresponding to an intercepted message201. A network component (e.g., a physical or logical network component) with traffic handling hardware and/or software logic intercepted a message in a session identified as an application layer session of an application that transmits a file in chunks over multiple application layer sessions. The network component intercepts the message (i.e., inspects or manipulates the message prior to the recipient endpoint receiving it) to obtain a message handling indication since the message relates to a multipart file transmission. In addition to the intercepted message201, the network component indicates an application identifier since application identification is performed at the network component. The multipart file transmission regulator uses the application identifier to select the protocol information.
At block205, the multipart file transmission regulator determines an action to prevent completion of the multipart file transmission of a file according to the selected protocol information. The protocol information indicates how file chunks are transmitted, how the corresponding metadata for reassembly is communicated, whether acknowledgements are required, and how a multipart file transmission begins and completes. The protocol information may also indicate other session management information, such as retries and timeouts. With this information, the multipart file transmission regulator determines an action that will prevent the completion of the multipart file transmission. For instance, the protocol information may indicate that an action to prevent completion is to stall a control message indicating completion of the multipart file transmission and/or acknowledging receipt of a last file chunk. The prevent action is not necessarily based solely on the protocol information. The multipart file transmission regulator may also refer to configuration information of a customer or default policy to determine the prevent action. Using the same example, the prevent action based on the protocol information may be to stall the identified control message, but configuration information may specify that at least one file chunk must also be stalled until a security analysis verdict has been obtained. Similarly, protocol information may indicate a prevent action to stall a last chunk but configuration information may specify a percentage of chunks to be stalled. Thus, the protocol information indicate a minimal action to prevent completion of a multipart file transmission while configuration information can expand the prevent action(s).
At block207, the multipart file transmission regulator generates a message handling indication based on the determined action. If the intercepted message matches the prevent action criterion, then the multipart file transmission regulator will generate an indication to stall the intercepted message. A more detailed example for block207 is provided inFIG.3.
At block209, the multipart file transmission regulator updates a data store of multipart file transmission states based on the intercepted message. An intercepted message may indicate another file chunk of a file transmission, reassembly metadata, a completion acknowledgement, etc. A more detailed example for block209 is provided inFIG.4.
At block211, the multipart file transmission regulator determines whether a condition is satisfied for security analysis submission. A condition for security analysis submission can be defined in configuration by customer, tenant, etc. For file granularity analysis, a condition is that the multipart file transmission regulator has sufficient metadata and chunks to reassemble the file for analysis. For file chunk granularity analysis, the condition may be the availability of the chunk but may also relate to any verdict of other chunks. For example, a condition may specify that analysis of a chunk can be skipped if another chunk of the same file already has a negative verdict. In some cases, a multipart file transmission may be subject to both granularities of analysis. For instance, malware scanning may be on both a chunk and file granularity. If the condition for file granularity analysis is satisfied, then operational flow proceeds to block213. If the condition for chunk granularity analysis is satisfied, then operational flow proceeds to block215. If no condition is satisfied, then operational flow ends.
At block213, the multipart file transmission regulator reassembles the file from the file chunks in the data store and submits the file for security analysis. Along with the chunks, the data store will also host metadata guiding reassembly of the file.
At block215, the multipart file transmission regulator submits the file chunk extracted from the intercepted message for security analysis. Submission of a file or a chunk for security analysis may be via service request (e.g., HTTP request), application programming interface (API) invocation, etc.
At block217, the multipart file transmission regulator obtains a security analysis verdict in response to the submission (block213 and/or block215). The dashed lines from blocks213,215 to217 represent the asynchronous relationship. The verdict may indicate that malware was detected or that sensitive information was detected in a file or chunk thus violating a DLP policy.
At block219, the multipart file transmission regulator communicates the verdict and/or a multipart file transmission completion indication based on the verdict to the network component that intercepted the message201. Embodiments may simply communicate the verdict to the network component that intercepted the message and rely on the security policy defined at the network component to drive the subsequent action based on the verdict (e.g., notification, quarantine, allowing transmission, etc.). For a negative/malicious verdict, the multipart file transmission will not complete since it has been stalled while awaiting security analysis. Embodiments can also communicate an indication regarding completion of the multipart file transmission based on the verdict. The completion indication may be to allow the stalled transmission to remain stalled or to terminate the corresponding application layer session, assuming a negative verdict. For a positive/benign verdict, the completion indication is to allow an intercepted message to proceed. If multiple messages of a multipart file transmission have been stalled, the completion indication may identify the sessions and/or messages to no longer stall based on information in the data store that tracks states of multipart file transmissions.
FIG.3 is a flowchart of example operations for generating a message handling indication for a message intercepted in an application layer session of a multipart file transmission based on determining an action to prevent completion of the multipart file transmission. The example operations relate to block207 ofFIG.2. Prior to these example operations, an action has been determined to prevent completion of a multipart file transmission. As described earlier, the action is determined with protocol information selected based on the application identified for the intercepted message.
At block301, the multipart file transmission regulator determines whether metadata of the intercepted message matches an action criterion. The action criterion will indicate an attribute (or criteria will indicate attributes) for message matching. Assuming a control message is to be stalled to prevent completion of the corresponding multipart file transmission, the criterion may specify a message type of control and possibly an additional attribute that the control message indicates completion or an acknowledgement. An action criterion may specify that a data message (i.e., a message carrying a data chunk) be stalled and allow for configuration to specify which chunk(s) to stall or default to stalling a last chunk, if the last chunk can be identified from metadata extracted from the message. To determine whether the intercepted message matches the action criterion or satisfies the action criterion, the multipart file transmission regulator evaluates the metadata associated with the intercepted message in the data store against the criterion. If the intercepted message matches the criterion, then operational flow process to block303. Otherwise, operational flow proceeds to block305.
At block303, the multipart file transmission regulator indicates to a network component that intercepted the message to stall the transmission of the intercepted message. The indication can be an application layer message, function invocation via an API, etc. Accordingly, the network component will update its information (e.g., a forwarding table) to stall the intercepted message. For instance, the packets/datagrams corresponding to the application layer message will be held in queues of the network component until a field is set that allows the packets to be transmitted.
At block305, the multipart file transmission regulator indicates to the network component to allow transmission of the intercepted message. Allowing transmission of the intercepted message avoids or at least reduces impact on user experience while ensuring cybersecurity compliance enforcement of a multipart file transmission.
FIG.4 is a flowchart of example operations for updating a data store of multipart file transmission states based on an intercepted message. The example operations ofFIG.4 relate to block209 ofFIG.2. Since state of a multipart file transmission is based on metadata extracted from message of different application layer sessions, the multipart file transmission regulator updates the data store and then queries/accesses the data store to determine state. Thus, each incremental update allows a more comprehensive view of a multipart file transmission.
At block401, the multipart file transmission regulator parses an intercepted message according to selected protocol information to extract metadata related to a multipart file transmission. With the selected protocol information, the multipart file transmission regulator can identify a field(s) of the message in the header and/or body that relates to the multipart file transmission. The message may include a field that specifies start of a chunk. The metadata in the field(s) may indicate message type (e.g., acknowledgement or data type) and/or chunk information (e.g., block identifier). The extracted metadata also identifies the multipart file transmission. This can be explicit. A protocol may require a field in messages to identify the multipart file transmission (e.g., download identifier or upload identifier). Identification of a multipart file transmission may be a combination of metadata. For example, a multipart file transmission may be identified by a file identifier and endpoint identifiers.
At block403, the multipart file transmission regulator determines whether the message includes a file chunk. If the message identifies the message as a control type or data type message, the multipart file transmission regulator can use this metadata to determine whether the message carries a file chunk. If the message includes a file chunk, then operational flow proceeds to block405. If it does not, then operational flow proceeds to block407.
At block407, the multipart file transmission regulator determines whether the metadata of the message indicates state of file transmission. Since the message does not carry a file chunk, the message is likely a control message. Depending upon the protocol, the message may indicate start or completion of a multipart file transmission. The message may be an acknowledgement of a chunk from the recipient to the sender. If the metadata indicates state of the multipart file transmission, then operational flow proceeds to block409.
At block409, the multipart file transmission regulator updates the data store for the multipart file transmission based on the extracted metadata. The multipart file transmission regulator determines whether an entry already exists for the multipart file transmission by querying the data store with the identifier of the multipart file transmission. If an entry exists, then the entry is updated with the metadata. If not, a new entry is created with the extracted metadata in association with the identifier of the multipart file transmission.
If the message was determined to be carrying a file chunk at block403, then the multipart file transmission regulator updates the data store with the file chunk and with metadata of the file chunk that at least identifies the multipart file transmission. Similar to block409, the multipart file transmission regulator uses the identifier or collection of metadata that identifies the multipart file transmission to query the data store and then updates a returned entry or inserts a new entry that includes or refers to the chunk along with extracted metadata. The metadata extracted from the intercepted message may identify the chunk with respect to the other chunks (e.g., chunk 3 of 5 or bytes100-300). To further avoid or reduce delay, the data store can be an in-memory structure (e.g., the Redis data structure store).
The set of example operations ofFIG.4 end after any of blocks405,407,409. If the metadata does not indicate state of the multipart file transmission, then operational flow proceeds to a next set of one or more operations for determining whether or not to submit the file or chunk for analysis (e.g., block211 ofFIG.2). Otherwise, after updating the data store (405,409), operations proceed to using the information in the data store to determine whether to submit a file and/or chunk for analysis.
Variations
In some cases, a protocol may include a retry mechanism that is triggered while a message is stalled according to the technology disclosed herein. As an example, an application layer retry mechanism for multipart file transmission may retransmit a stalled chunk in smaller chunks in other application layer sessions. Protocol information maintained for regulating multipart file transmission for cybersecurity policy enforcement will indicate that a retry mechanism exists and the application sender will attempt to retransmit a chunk in smaller chunks if acknowledgement of a chunk (e.g., last chunk) is not received within a timeout period. Embodiments can be configured to allow a subset of the smaller chunks, stall all of the smaller chunks, or discard all of the smaller chunks. The smaller chunks could be discarded assuming the chunk from which the smaller chunks were generated will be transmitted upon receipt of a benign verdict, for example. Implementations can perform “housekeeping” differently when smaller chunks are detected in retransmission sessions. For instance, the subset of smaller chunks can be held instead of the larger chunk or both the small chunks and corresponding large chunk can be maintained in traffic queues and released with receipt of a benign verdict depending upon how the protocol handles the scenario.
The flowcharts are provided to aid in understanding the illustrations and are not to be used to limit scope of the claims. The flowcharts depict example operations that can vary within the scope of the claims. Additional operations may be performed; fewer operations may be performed; the operations may be performed in parallel; and the operations may be performed in a different order. Although depicted as occurring after block207, block209 may be performed prior to block205 or concurrently with blocks205 or207. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by program code. The program code may be provided to a processor of a general purpose computer, special purpose computer, or other programmable machine or apparatus.
As will be appreciated, aspects of the disclosure may be embodied as a system, method or program code/instructions stored in one or more machine-readable media. Accordingly, aspects may take the form of hardware, software (including firmware, resident software, micro-code, etc.), or a combination of software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” The functionality presented as individual modules/units in the example illustrations can be organized differently in accordance with any one of platform (operating system and/or hardware), application ecosystem, interfaces, programmer preferences, programming language, administrator preferences, etc.
Any combination of one or more machine readable medium(s) may be utilized. The machine readable medium may be a machine readable signal medium or a machine readable storage medium. A machine readable storage medium may be, for example, but not limited to, a system, apparatus, or device, that employs any one of or combination of electronic, magnetic, optical, electromagnetic, infrared, or semiconductor technology to store program code. More specific examples (a non-exhaustive list) of the machine readable storage medium would include the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a machine readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. A machine readable storage medium is not a machine readable signal medium.
A machine readable signal medium may include a propagated data signal with machine readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A machine readable signal medium may be any machine readable medium that is not a machine readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a machine readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as the Java® programming language, C++ or the like; a dynamic programming language such as Python; a scripting language such as Perl programming language or PowerShell script language; and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on a stand-alone machine, may execute in a distributed manner across multiple machines, and may execute on one machine while providing results and or accepting input on another machine.
The program code/instructions may also be stored in a machine readable medium that can direct a machine to function in a particular manner, such that the instructions stored in the machine readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
FIG.5 depicts an example computer system with a protocol-based multipart file transmission regulator. The computer system includes a processor501 (possibly including multiple processors, multiple cores, multiple nodes, and/or implementing multi-threading, etc.). The computer system includes memory507. The memory507 may be system memory or any one or more of the above already described possible realizations of machine-readable media. The computer system also includes a bus503 and a network interface505. The system also includes a protocol-based multipart file transmission regulator511. The protocol-based multipart file transmission regulator511 regulates transmission of messages in application layer sessions of a multipart file transmission to allow for analysis of file chunks with minimal impact on user experience and without increasing resource demand on an intermediary network component handling and examining traffic between endpoints. Any one of the previously described functionalities may be partially (or entirely) implemented in hardware and/or on the processor501. For example, the functionality may be implemented with an application specific integrated circuit, in logic implemented in the processor501, in a co-processor on a peripheral device or card, etc. Further, realizations may include fewer or additional components not illustrated inFIG.5 (e.g., video cards, audio cards, additional network interfaces, peripheral devices, etc.). The processor unit501 and the network interface505 are coupled to the bus503. Although illustrated as being coupled to the bus503, the memory507 may be coupled to the processor501.
Use of the phrase “at least one of” preceding a list with the conjunction “and” should not be treated as an exclusive list and should not be construed as a list of categories with one item from each category, unless specifically stated otherwise. A clause that recites “at least one of A, B, and C” can be infringed with only one of the listed items, multiple of the listed items, and one or more of the items in the list and another item not listed.

Claims (22)

The invention claimed is:
1. A method comprising:
based on an identification of an application for a first session of multiple sessions for a multipart file transmission of a file, determining a prevent action to prevent completion of the multipart file transmission;
instructing an intermediary network component to allow transmission or stall transmission of a first message in the first session based, at least in part, on the prevent action;
obtaining from the first message a first chunk of a plurality of chunks that constitutes the file and first metadata of the first chunk;
updating a data store to indicate the first chunk and the first metadata;
determining whether a cybersecurity analysis condition is satisfied based on information in the data store corresponding to the file;
based on a determination that the cybersecurity analysis condition is satisfied, supplying the first chunk or the file for cybersecurity analysis; and
communicating to the intermediary network component at least one of a verdict of the cybersecurity analysis and an indication to allow or prevent completion of the multipart file transmission.
2. The method ofclaim 1 further comprising:
parsing, based on a protocol of the identified application, at least one of a header and a payload of the first message to obtain the first chunk and the first metadata.
3. The method ofclaim 1, wherein determining the prevent action comprises determining whether stalling transmission of a control message or a file chunk will prevent completion of the multipart file transmission based on a protocol of the identified application.
4. The method ofclaim 1, wherein determining the prevent action is also based on configuration information.
5. The method ofclaim 1, wherein the prevent action comprises stalling transmission of a subset of chunks that constitute a file to a recipient endpoint, stalling transmission of a control message that indicates completion of a multipart file transmission, stalling transmission of an acknowledgement message, and stalling transmission to a recipient endpoint of a control message for reassembling chunks into a file.
6. The method ofclaim 1, wherein communicating an indication to allow completion of the multipart file transmission is based on the verdict indicating that the file is benign or that transmission of the file does not violate a policy.
7. The method ofclaim 1, wherein communicating an indication to prevent completion of the multipart file transmission is based on the verdict indicating that the file or the first chunk is malicious or that transmission of the file or the first chunk violates a policy.
8. The method ofclaim 1 further comprising:
obtaining the other chunks of the plurality of chunks and corresponding metadata from other messages in the other ones of the multiple sessions; and
updating the data store to indicate the other chunks and corresponding metadata,
wherein determining whether the cybersecurity analysis condition is satisfied based on information in the data store corresponding to the file comprises determining whether the file can be reassembled based on chunks and metadata in the data store.
9. The method ofclaim 1, wherein the verdict is for one of the first chunk and the file.
10. A non-transitory machine-readable medium having stored thereon program code, the program code comprising instructions to:
track states of files of multipart file transmissions to facilitate cybersecurity compliance, wherein the instructions to track states of the files comprise instructions to,
based on receipt of a communication indicating an intercepted message of a session and an application identified for the session, update a data store based on the intercepted message;
based on the identified application, determine an action to prevent completion of a multipart file transmission corresponding to the session; and
indicate to a network component to stall or allow transmission of the intercepted message based on the determined action;
based on receipt of the communication indicating the intercepted message, determine whether a cybersecurity analysis condition is satisfied based on information in the data store corresponding to the multipart file transmission;
if the cybersecurity analysis condition is satisfied, obtain a cybersecurity analysis verdict for a file of the multipart file transmission or a file chunk extracted from the intercepted message; and
communicate to a network component that intercepted the intercepted message at least one of a verdict of the cybersecurity analysis and an indication to allow or prevent completion of the multipart file transmission.
11. The non-transitory machine-readable medium ofclaim 10, wherein the instructions to communicate the indication to allow completion of the multipart file transmission comprise instructions to determine that the cybersecurity analysis verdict indicates the file as benign or transmission of the file as not violating a cybersecurity policy.
12. The non-transitory machine-readable medium ofclaim 10, wherein the instructions to communicate the indication to prevent completion of the multipart file transmission comprise instructions to determine that the cybersecurity analysis verdict indicates the file or a file chunk as malicious or transmission of the file or a file chunk as violating a policy.
13. The non-transitory machine-readable medium ofclaim 10, wherein the instructions to update the data store based on the intercepted message comprise instructions to extract a file chunk from the intercepted message based on a protocol of the identified application and store the file chunk in the data store in association with information identifying the session, the multipart file transmission corresponding to the session, and the identified application.
14. The non-transitory machine-readable medium ofclaim 10, wherein the instructions to update the data store based on the intercepted message comprise instructions to determine the intercepted message is a control message based on a protocol of the identified application, and update the data store to indicate the control message, information identifying the session, information identifying the multipart file transmission corresponding to the session, and a type of the control message.
15. The non-transitory machine-readable medium ofclaim 10, wherein the instructions to determine the action to prevent completion of the multipart file transmission corresponding to the session based on the identified application comprise instructions to select the action from a plurality of actions based on the identified application, wherein the plurality of actions corresponds to a plurality of protocols of different applications.
16. The non-transitory machine-readable medium ofclaim 10, wherein the instructions to determine whether the cybersecurity analysis condition is satisfied comprise instructions to determine whether the file can be reassembled based on information and file chunks in the data store.
17. The non-transitory machine-readable medium ofclaim 16, wherein the program code further comprises instructions to reassemble the file with the file chunks and information in the data store based on a determination that the cybersecurity analysis condition is satisfied.
18. The non-transitory machine-readable medium ofclaim 10, wherein the instructions to determine whether a cybersecurity analysis condition is satisfied comprise instructions to determine whether a cybersecurity analysis verdict has been obtained for at least one of the multiple file chunks that constitute the file.
19. An apparatus comprising:
a processor;
a set of one or more network interfaces; and
a set of one or more machine-readable medium having program code stored thereon, the program code executable by the processor to cause the apparatus to,
track states of files of multipart file transmissions to facilitate cybersecurity compliance, wherein the instructions to track states of the files comprise instructions to,
based on receipt of a communication via one of the set of network interfaces indicating an intercepted message of a session and an application identified for the session, update a data store based on the intercepted message;
based on the identified application, determine an action to prevent completion of a multipart file transmission corresponding to the session; and
indicate to a network component to stall or allow transmission of the intercepted message based on the determined action;
based on receipt of the communication indicating the intercepted message, determine whether a cybersecurity analysis condition is satisfied based on information in the data store corresponding to the multipart file transmission;
if the cybersecurity analysis condition is satisfied, obtain a cybersecurity analysis verdict for a file of the multipart file transmission or a file chunk extracted from the intercepted message; and
communicate to a network component that intercepted the intercepted message at least one of a verdict of the cybersecurity analysis and an indication to allow or prevent completion of the multipart file transmission.
20. The apparatus ofclaim 19, wherein the program code to communicate to a network component that intercepted the intercepted message an indication to allow or prevent completion of the multipart file transmission comprises the program code being executable by the processor to cause the apparatus to,
based on the cybersecurity analysis verdict indicating the file as benign or transmission of the file as not violating a cybersecurity policy, indicate to the network component to allow transmission of the intercepted message to a recipient endpoint, or
based on the cybersecurity analysis verdict indicating the file or a file chunk as malicious or transmission of the file or a file chunk as violating a cybersecurity policy, indicate to the network component to stall or prevent transmission of the intercepted message to a recipient endpoint.
21. The apparatus ofclaim 19, wherein the program code to determine the action to prevent completion of the multipart file transmission corresponding to the session based on the identified application comprises the program code being executable by the processor to cause the apparatus to select the action from a plurality of actions based on the identified application, wherein the plurality of actions corresponds to a plurality of protocols of different applications.
22. The apparatus ofclaim 19, wherein the program code to determine whether the cybersecurity analysis condition is satisfied comprises the program code being executable by the processor to cause the apparatus to determine whether the file can be reassembled based on information and file chunks in the data store or to determine whether a cybersecurity analysis verdict has been obtained for at least one of the multiple file chunks that constitute the file.
US18/170,0842023-02-162023-02-16Inline inspection cybersecurity enforcement of multipart file transmissionsActive2043-07-13US12407651B2 (en)

Priority Applications (3)

Application NumberPriority DateFiling DateTitle
US18/170,084US12407651B2 (en)2023-02-162023-02-16Inline inspection cybersecurity enforcement of multipart file transmissions
PCT/US2024/013115WO2024173021A1 (en)2023-02-162024-01-26Inline inspection cybersecurity enforcement of multipart file transmissions
CN202480012806.4ACN120693841A (en)2023-02-162024-01-26 Online Inspection of Multipart File Transfers for Network Security Implementation

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US18/170,084US12407651B2 (en)2023-02-162023-02-16Inline inspection cybersecurity enforcement of multipart file transmissions

Publications (2)

Publication NumberPublication Date
US20240283775A1 US20240283775A1 (en)2024-08-22
US12407651B2true US12407651B2 (en)2025-09-02

Family

ID=90363106

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US18/170,084Active2043-07-13US12407651B2 (en)2023-02-162023-02-16Inline inspection cybersecurity enforcement of multipart file transmissions

Country Status (3)

CountryLink
US (1)US12407651B2 (en)
CN (1)CN120693841A (en)
WO (1)WO2024173021A1 (en)

Citations (114)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5960170A (en)*1997-03-181999-09-28Trend Micro, Inc.Event triggered iterative virus detection
US20030093643A1 (en)*2001-11-092003-05-15Britt Joe FreemanApparatus and method for allocating memory blocks
US6772337B1 (en)*1999-11-092004-08-03Lucent Technologies Inc.Light weight security for parallel access to multiple mirror sites
US20050154738A1 (en)*2004-01-092005-07-14Steve ThomasSystem and method for protecting files on a computer from access by unauthorized applications
US20070124415A1 (en)*2005-11-292007-05-31Etai Lev-RanMethod and apparatus for reducing network traffic over low bandwidth links
US20080154851A1 (en)*2006-12-212008-06-26Canon Kabushiki KaishaMethod and apparatus for sharing files over a network
US20090043978A1 (en)*2007-08-062009-02-12International Business Machines CorporationEfficient hierarchical storage management of a file system with snapshots
US20090240678A1 (en)*2008-03-192009-09-24Microsoft CorporationPurposing persistent data through hardware metadata tagging
US20090248886A1 (en)*2007-12-272009-10-01At&T Labs, Inc.Network-Optimized Content Delivery for High Demand Non-Live Contents
US20100011435A1 (en)*2008-07-082010-01-14Asp Works Pte LtdMethod and System for Providing Guaranteed File Transfer in Corporate Environment Behind Firewall
US20100077161A1 (en)*2008-09-242010-03-25Timothy John StoakesIdentifying application metadata in a backup stream
US20100212010A1 (en)*2009-02-182010-08-19Stringer John DSystems and methods that detect sensitive data leakages from applications
US20100217889A1 (en)*2009-02-262010-08-26Honeywell International Inc.Accelerated block option for trivial file transfer protocol (tftp)
US20100228737A1 (en)*2009-02-262010-09-09Red Hat, Inc.HTTP Range Checksum
US20100235472A1 (en)*2009-03-162010-09-16Microsoft CorporationSmooth, stateless client media streaming
US20100293142A1 (en)*2009-05-122010-11-18Revinetix, Inc.System and method for transmitting needed portions of a data file between networked computers
US20110246491A1 (en)*2010-04-012011-10-06Avere Systems, Inc.Method and apparatus for tiered storage
US8132073B1 (en)*2009-06-302012-03-06Emc CorporationDistributed storage system with enhanced security
US20120150826A1 (en)*2010-12-142012-06-14Commvault Systems, Inc.Distributed deduplicated storage system
US20120167074A1 (en)*2010-12-242012-06-28Microsoft CorporationOn-demand or incremental remote data copy
US20120233522A1 (en)*2011-03-082012-09-13Rackspace Us, Inc.Method for handling large object files in an object storage system
US20120303833A1 (en)*2011-05-262012-11-29Agency For Science, Technology And ResearchMethods for transmitting and receiving a digital signal, transmitter and receiver
US20120311403A1 (en)*2011-06-062012-12-06Cleversafe, Inc.Prioritized deleting of slices stored in a dispersed storage network
US20120331107A1 (en)*2011-06-232012-12-27Honeywell International Inc.Systems and methods for negotiated accelerated block option for trivial file transfer protocol (tftp)
US20130031149A1 (en)*2011-07-262013-01-31Mark KernSystems and methods of distributed file storage
US20130047057A1 (en)*2011-08-172013-02-21Cleversafe, Inc.Detecting intentional corruption of data in a dispersed storage network
US20130073522A1 (en)*2010-10-272013-03-21Huawei Technologies Co., Ltd.Method and device for processing files of distributed file system
US20130110904A1 (en)*2011-10-272013-05-02Hitachi, Ltd.Method and apparatus to forward shared file stored in block storages
US8533166B1 (en)*2010-08-202013-09-10Brevity Ventures LLCMethods and systems for encoding/decoding files and transmission thereof
US20130246377A1 (en)*2008-08-122013-09-19Jitendra B. GaitondeConfiguration management for a capture/registration system
US20140053227A1 (en)*2012-08-142014-02-20Adi RuppinSystem and Method for Secure Synchronization of Data Across Multiple Computing Devices
US20140068006A1 (en)*2012-08-312014-03-06Fusenet Inc.Method, apparatus and system for providing content
US20140157405A1 (en)*2012-12-042014-06-05Bill JollCyber Behavior Analysis and Detection Method, System and Architecture
US20140188868A1 (en)*2012-12-272014-07-03Dropbox, Inc.Predictive models of file access patterns by application and file type
US20140259094A1 (en)*2013-03-062014-09-11Netscope, Inc.Security for network delivered services
US8839374B1 (en)*2011-12-152014-09-16Symantec CorporationSystems and methods for identifying security risks in downloads
US20140328573A1 (en)*2009-12-292014-11-06Cleversafe, Inc.Accessing stored multi-media content based on a subscription priority level
US8893278B1 (en)*2011-07-122014-11-18Trustwave Holdings, Inc.Detecting malware communication on an infected computing device
US20150039645A1 (en)*2013-08-022015-02-05Formation Data Systems, Inc.High-Performance Distributed Data Storage System with Implicit Content Routing and Data Deduplication
US20150128246A1 (en)*2013-11-072015-05-07Attivo Networks Inc.Methods and apparatus for redirecting attacks on a network
US20150163301A1 (en)*2013-12-062015-06-11Cellco Partnership D/B/A Verizon WirelessSystem for and method for media upload multithreading for large file uploads
US20150180931A1 (en)*2013-12-192015-06-25Michael MarrContent delivery methods and systems
US20150222685A1 (en)*2014-01-312015-08-06International Business Machines CorporationPartitioning digital media for consumption
US20150237060A1 (en)*2008-10-082015-08-20Cisco Technology, Inc.Target-based smb and dce/rpc processing for an intrusion detection system or intrusion prevention system
US20150332059A1 (en)*2014-05-152015-11-19Michael E. JohnsonElectronic transmission security process
US20160044100A1 (en)*2014-08-062016-02-11Dell Products L.P.Accelerating transfer protocols
US20160072888A1 (en)*2014-09-102016-03-10Panzura, Inc.Sending interim notifications for namespace operations for a distributed filesystem
US20160119243A1 (en)*2014-10-222016-04-28Samsung Sds Co., Ltd.Apparatus and method for transmitting file
US20160127260A1 (en)*2014-10-292016-05-05DLVR, Inc.Systems and methods for session-based resource assignment, delivery, performance management and measurement in a networked environment
US9407726B1 (en)*2013-03-152016-08-02Juniper Networks, Inc.Caching objects identified by dynamic resource identifiers
US20160248841A1 (en)*2015-02-242016-08-25International Business Machines CorporationMetadata Sharing To Decrease File Transfer Time
US20160277377A1 (en)*2015-03-212016-09-22Roger MarchPrivacy and Performance Tuning Apparatus for a Versioned File Block Access Method
US20160277185A1 (en)*2015-03-192016-09-22Cloud-Clout, LLCSecure computer file storage system and method
US20160285912A1 (en)*2015-03-232016-09-29Sonicwall, Inc.Non rfc-compliant protocol classification based on real use
US20160301751A1 (en)*2015-04-072016-10-13Microsoft Technology Licensing, LlcCollaboration data proxy system in cloud computing platforms
US20160314052A1 (en)*2009-12-292016-10-27International Business Machines CorporationDispersed multi-media content for a centralized digital video storage system
US20160321288A1 (en)*2015-04-292016-11-03Box, Inc.Multi-regime caching in a virtual file system for cloud-based shared content
US9537952B1 (en)*2016-01-292017-01-03Dropbox, Inc.Apparent cloud access for hosted content items
US20170070302A1 (en)*2015-09-042017-03-09Alively, Inc.System and method for sharing mobile video and audio content
US20170091086A1 (en)*2015-09-292017-03-30International Business Machines CorporationDetection of file corruption in a distributed file system
US20170091047A1 (en)*2015-09-302017-03-30Commvault Systems, Inc.Dynamic triggering of block-level backups based on block change thresholds and corresponding file identities in a data storage management system
US20170099258A1 (en)*2015-10-052017-04-06Zyxel Communications, Inc.Device for providing security barrier for network
US20170109370A1 (en)*2015-01-302017-04-20Dropbox, Inc.Selective Downloading of Shared Content Items in a Constrained Synchronization System
US20170134428A1 (en)*2015-11-102017-05-11Dell Software Inc.Firewall informed by web server security policy identifying authorized resources and hosts
US20170272543A1 (en)*2016-03-182017-09-21Qualcomm IncorporatedSignaling of Application Content Packaging and Delivery
US20170337399A1 (en)*2016-05-182017-11-23International Business Machines CorporationPrivacy enabled runtime
US20180018458A1 (en)*2016-07-142018-01-18Mcafee, Inc.Mitigation of ransomware
US20180089224A1 (en)*2016-09-292018-03-29Hewlett Packard Enterprise Development LpTiering data blocks to cloud storage systems
US9940203B1 (en)*2015-06-112018-04-10EMC IP Holding Company LLCUnified interface for cloud-based backup and restoration
US9984088B1 (en)*2015-03-312018-05-29Maginatics LlcUser driven data pre-fetch
US10009412B1 (en)*2017-02-092018-06-26International Business Machines CorporationDistributed file transfer with high performance
US20180329834A1 (en)*2011-11-282018-11-15International Business Machines CorporationSecurely storing random keys in a dispersed storage network
US10146638B1 (en)*2016-06-242018-12-04EMC IP Holding Company LLCCheck point recovery based on identifying changed blocks for block-based backup files
US20190007198A1 (en)*2017-07-032019-01-03Thomson LicensingTransfer of content in a peer-to-peer network
US20190109870A1 (en)*2017-09-142019-04-11Commvault Systems, Inc.Ransomware detection and intelligent restore
US20190179804A1 (en)*2017-12-122019-06-13Interset Software, Inc.Tracking file movement in a network environment
US10432686B1 (en)*2016-06-132019-10-01Amazon Technologies, Inc.Streaming media file management
US10503904B1 (en)*2017-06-292019-12-10Fireeye, Inc.Ransomware detection and mitigation
US10523755B1 (en)*2016-02-172019-12-31Amazon Technologies, Inc.Peer-based cloud storage for media broadcasts
US10616336B1 (en)*2016-09-202020-04-07Parallels International GmbhFile access service
US20200134051A1 (en)*2018-10-312020-04-30EMC IP Holding Company LLCDual layer deduplication for application specific file types in an information processing system
US20200145499A1 (en)*2018-11-062020-05-07Dropbox, Inc.Technologies for integrating cloud content items across platforms
US20200293408A1 (en)*2019-03-122020-09-17Commvault Systems, Inc.Managing structured data in a data storage system
US10795588B1 (en)*2016-06-242020-10-06EMC IP Holding Company LLCCheck point recovery based on identifying used blocks for block-based backup files
US20200322287A1 (en)*2020-06-182020-10-08Intel CorporationSwitch-managed resource allocation and software execution
US20200364370A1 (en)*2019-05-142020-11-19Google LlcAutomatically detecting unauthorized re-identification
US10880322B1 (en)*2016-09-262020-12-29Agari Data, Inc.Automated tracking of interaction with a resource of a message
US20210064238A1 (en)*2019-08-302021-03-04Hewlett Packard Enterprise Development LpData integrity verification
US20210211407A1 (en)*2020-01-072021-07-08Palantir Technologies Inc.Automated syncing of data between security domains
US20210227022A1 (en)*2020-01-202021-07-22International Business Machines CorporationMedia obfuscation
US20210234872A1 (en)*2020-01-282021-07-29Rubrik, Inc.Malware protection for virtual machines
US20210320941A1 (en)*2020-04-102021-10-14AttackIQ, Inc.Method for emulating a known attack on a target computer network
US20210400060A1 (en)*2020-06-182021-12-23Peter ChackoSystem and methods for storage intrusion mitigation with data transport overlay tunnels and secure vaulting
US20210400106A1 (en)*2020-06-192021-12-23Microsoft Technology Licensing, LlcPredictive model application for file upload blocking determinations
US20220012336A1 (en)*2020-07-102022-01-13International Business Machines CorporationBlock-based anomaly detection
US20220070223A1 (en)*2020-08-312022-03-03Palo Alto Networks, Inc.Security platform with external inline processing of assembled selected traffic
US20220078236A1 (en)*2020-09-102022-03-10EMC IP Holding Company LLCMultipart upload for distributed file systems
US11277467B1 (en)*2019-09-302022-03-15Cadence Design Systems, Inc.Method, system, and product for orchestrating uploads of very large design files to selected cloud providers in a multi-cloud arrangement
US20220083509A1 (en)*2020-09-162022-03-17Citrix Systems, Inc.File transfer systems and methods
US20220116406A1 (en)*2020-10-122022-04-14Microsoft Technology Licensing, LlcMalware detection and mitigation via a forward proxy server
US20220201034A1 (en)*2020-12-172022-06-23International Business Machines CorporationContext-based simulation of content
US11381587B2 (en)*2019-01-202022-07-05Helios Data Inc.Data segmentation
US11425205B1 (en)*2019-07-162022-08-23Whatsapp Inc.Methods and systems for transmitting an image in chunks
US11451569B1 (en)*2021-04-172022-09-20Arbor Networks, Inc.File extraction from network data to artifact store files and file reconstruction
US11663336B1 (en)*2022-04-062023-05-30Dell Products L.P.Block-based protection from ransomware
US20230199017A1 (en)*2021-12-222023-06-22Peter ChackoZero trust data castle system with security operation methods for active response
US20230259382A1 (en)*2022-02-162023-08-17Sysdig, Inc.Configuring metric collection based on application information
US11755733B1 (en)*2022-04-062023-09-12Dell Products L.P.Identifying ransomware host attacker
US11841970B1 (en)*2007-09-262023-12-12Trend Micro IncorporatedSystems and methods for preventing information leakage
US20230403318A1 (en)*2022-06-142023-12-14Nvidia CorporationDifferential data transfer using congestion control
US20230412693A1 (en)*2022-06-152023-12-21Microsoft Technology Licensing, LlcNetwork-aware endpoint data loss prevention for web transactions
US20230412669A1 (en)*2022-06-152023-12-21Microsoft Technology Licensing, LlcSelf-driven adaptive upload
US20230421562A1 (en)*2022-05-192023-12-28Capital One Services, LlcMethod and system for protection of cloud-based infrastructure
US12143389B1 (en)*2022-02-042024-11-12Wells Fargo Bank, N.A.3rd party data explorer

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP6598188B2 (en)*2015-02-272019-10-30株式会社エヴリカ Information processing apparatus, method, and program
US10027673B2 (en)*2016-01-042018-07-17Bank Of America CorporationSystem for controlled data exchange in a file hosting service environment

Patent Citations (114)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5960170A (en)*1997-03-181999-09-28Trend Micro, Inc.Event triggered iterative virus detection
US6772337B1 (en)*1999-11-092004-08-03Lucent Technologies Inc.Light weight security for parallel access to multiple mirror sites
US20030093643A1 (en)*2001-11-092003-05-15Britt Joe FreemanApparatus and method for allocating memory blocks
US20050154738A1 (en)*2004-01-092005-07-14Steve ThomasSystem and method for protecting files on a computer from access by unauthorized applications
US20070124415A1 (en)*2005-11-292007-05-31Etai Lev-RanMethod and apparatus for reducing network traffic over low bandwidth links
US20080154851A1 (en)*2006-12-212008-06-26Canon Kabushiki KaishaMethod and apparatus for sharing files over a network
US20090043978A1 (en)*2007-08-062009-02-12International Business Machines CorporationEfficient hierarchical storage management of a file system with snapshots
US11841970B1 (en)*2007-09-262023-12-12Trend Micro IncorporatedSystems and methods for preventing information leakage
US20090248886A1 (en)*2007-12-272009-10-01At&T Labs, Inc.Network-Optimized Content Delivery for High Demand Non-Live Contents
US20090240678A1 (en)*2008-03-192009-09-24Microsoft CorporationPurposing persistent data through hardware metadata tagging
US20100011435A1 (en)*2008-07-082010-01-14Asp Works Pte LtdMethod and System for Providing Guaranteed File Transfer in Corporate Environment Behind Firewall
US20130246377A1 (en)*2008-08-122013-09-19Jitendra B. GaitondeConfiguration management for a capture/registration system
US20100077161A1 (en)*2008-09-242010-03-25Timothy John StoakesIdentifying application metadata in a backup stream
US20150237060A1 (en)*2008-10-082015-08-20Cisco Technology, Inc.Target-based smb and dce/rpc processing for an intrusion detection system or intrusion prevention system
US20100212010A1 (en)*2009-02-182010-08-19Stringer John DSystems and methods that detect sensitive data leakages from applications
US20100217889A1 (en)*2009-02-262010-08-26Honeywell International Inc.Accelerated block option for trivial file transfer protocol (tftp)
US20100228737A1 (en)*2009-02-262010-09-09Red Hat, Inc.HTTP Range Checksum
US20100235472A1 (en)*2009-03-162010-09-16Microsoft CorporationSmooth, stateless client media streaming
US20100293142A1 (en)*2009-05-122010-11-18Revinetix, Inc.System and method for transmitting needed portions of a data file between networked computers
US8132073B1 (en)*2009-06-302012-03-06Emc CorporationDistributed storage system with enhanced security
US20140328573A1 (en)*2009-12-292014-11-06Cleversafe, Inc.Accessing stored multi-media content based on a subscription priority level
US20160314052A1 (en)*2009-12-292016-10-27International Business Machines CorporationDispersed multi-media content for a centralized digital video storage system
US20110246491A1 (en)*2010-04-012011-10-06Avere Systems, Inc.Method and apparatus for tiered storage
US8533166B1 (en)*2010-08-202013-09-10Brevity Ventures LLCMethods and systems for encoding/decoding files and transmission thereof
US20130073522A1 (en)*2010-10-272013-03-21Huawei Technologies Co., Ltd.Method and device for processing files of distributed file system
US20120150826A1 (en)*2010-12-142012-06-14Commvault Systems, Inc.Distributed deduplicated storage system
US20120167074A1 (en)*2010-12-242012-06-28Microsoft CorporationOn-demand or incremental remote data copy
US20120233522A1 (en)*2011-03-082012-09-13Rackspace Us, Inc.Method for handling large object files in an object storage system
US20120303833A1 (en)*2011-05-262012-11-29Agency For Science, Technology And ResearchMethods for transmitting and receiving a digital signal, transmitter and receiver
US20120311403A1 (en)*2011-06-062012-12-06Cleversafe, Inc.Prioritized deleting of slices stored in a dispersed storage network
US20120331107A1 (en)*2011-06-232012-12-27Honeywell International Inc.Systems and methods for negotiated accelerated block option for trivial file transfer protocol (tftp)
US8893278B1 (en)*2011-07-122014-11-18Trustwave Holdings, Inc.Detecting malware communication on an infected computing device
US20130031149A1 (en)*2011-07-262013-01-31Mark KernSystems and methods of distributed file storage
US20130047057A1 (en)*2011-08-172013-02-21Cleversafe, Inc.Detecting intentional corruption of data in a dispersed storage network
US20130110904A1 (en)*2011-10-272013-05-02Hitachi, Ltd.Method and apparatus to forward shared file stored in block storages
US20180329834A1 (en)*2011-11-282018-11-15International Business Machines CorporationSecurely storing random keys in a dispersed storage network
US8839374B1 (en)*2011-12-152014-09-16Symantec CorporationSystems and methods for identifying security risks in downloads
US20140053227A1 (en)*2012-08-142014-02-20Adi RuppinSystem and Method for Secure Synchronization of Data Across Multiple Computing Devices
US20140068006A1 (en)*2012-08-312014-03-06Fusenet Inc.Method, apparatus and system for providing content
US20140157405A1 (en)*2012-12-042014-06-05Bill JollCyber Behavior Analysis and Detection Method, System and Architecture
US20140188868A1 (en)*2012-12-272014-07-03Dropbox, Inc.Predictive models of file access patterns by application and file type
US20140259094A1 (en)*2013-03-062014-09-11Netscope, Inc.Security for network delivered services
US9407726B1 (en)*2013-03-152016-08-02Juniper Networks, Inc.Caching objects identified by dynamic resource identifiers
US20150039645A1 (en)*2013-08-022015-02-05Formation Data Systems, Inc.High-Performance Distributed Data Storage System with Implicit Content Routing and Data Deduplication
US20150128246A1 (en)*2013-11-072015-05-07Attivo Networks Inc.Methods and apparatus for redirecting attacks on a network
US20150163301A1 (en)*2013-12-062015-06-11Cellco Partnership D/B/A Verizon WirelessSystem for and method for media upload multithreading for large file uploads
US20150180931A1 (en)*2013-12-192015-06-25Michael MarrContent delivery methods and systems
US20150222685A1 (en)*2014-01-312015-08-06International Business Machines CorporationPartitioning digital media for consumption
US20150332059A1 (en)*2014-05-152015-11-19Michael E. JohnsonElectronic transmission security process
US20160044100A1 (en)*2014-08-062016-02-11Dell Products L.P.Accelerating transfer protocols
US20160072888A1 (en)*2014-09-102016-03-10Panzura, Inc.Sending interim notifications for namespace operations for a distributed filesystem
US20160119243A1 (en)*2014-10-222016-04-28Samsung Sds Co., Ltd.Apparatus and method for transmitting file
US20160127260A1 (en)*2014-10-292016-05-05DLVR, Inc.Systems and methods for session-based resource assignment, delivery, performance management and measurement in a networked environment
US20170109370A1 (en)*2015-01-302017-04-20Dropbox, Inc.Selective Downloading of Shared Content Items in a Constrained Synchronization System
US20160248841A1 (en)*2015-02-242016-08-25International Business Machines CorporationMetadata Sharing To Decrease File Transfer Time
US20160277185A1 (en)*2015-03-192016-09-22Cloud-Clout, LLCSecure computer file storage system and method
US20160277377A1 (en)*2015-03-212016-09-22Roger MarchPrivacy and Performance Tuning Apparatus for a Versioned File Block Access Method
US20160285912A1 (en)*2015-03-232016-09-29Sonicwall, Inc.Non rfc-compliant protocol classification based on real use
US9984088B1 (en)*2015-03-312018-05-29Maginatics LlcUser driven data pre-fetch
US20160301751A1 (en)*2015-04-072016-10-13Microsoft Technology Licensing, LlcCollaboration data proxy system in cloud computing platforms
US20160321288A1 (en)*2015-04-292016-11-03Box, Inc.Multi-regime caching in a virtual file system for cloud-based shared content
US9940203B1 (en)*2015-06-112018-04-10EMC IP Holding Company LLCUnified interface for cloud-based backup and restoration
US20170070302A1 (en)*2015-09-042017-03-09Alively, Inc.System and method for sharing mobile video and audio content
US20170091086A1 (en)*2015-09-292017-03-30International Business Machines CorporationDetection of file corruption in a distributed file system
US20170091047A1 (en)*2015-09-302017-03-30Commvault Systems, Inc.Dynamic triggering of block-level backups based on block change thresholds and corresponding file identities in a data storage management system
US20170099258A1 (en)*2015-10-052017-04-06Zyxel Communications, Inc.Device for providing security barrier for network
US20170134428A1 (en)*2015-11-102017-05-11Dell Software Inc.Firewall informed by web server security policy identifying authorized resources and hosts
US9537952B1 (en)*2016-01-292017-01-03Dropbox, Inc.Apparent cloud access for hosted content items
US10523755B1 (en)*2016-02-172019-12-31Amazon Technologies, Inc.Peer-based cloud storage for media broadcasts
US20170272543A1 (en)*2016-03-182017-09-21Qualcomm IncorporatedSignaling of Application Content Packaging and Delivery
US20170337399A1 (en)*2016-05-182017-11-23International Business Machines CorporationPrivacy enabled runtime
US10432686B1 (en)*2016-06-132019-10-01Amazon Technologies, Inc.Streaming media file management
US10146638B1 (en)*2016-06-242018-12-04EMC IP Holding Company LLCCheck point recovery based on identifying changed blocks for block-based backup files
US10795588B1 (en)*2016-06-242020-10-06EMC IP Holding Company LLCCheck point recovery based on identifying used blocks for block-based backup files
US20180018458A1 (en)*2016-07-142018-01-18Mcafee, Inc.Mitigation of ransomware
US10616336B1 (en)*2016-09-202020-04-07Parallels International GmbhFile access service
US10880322B1 (en)*2016-09-262020-12-29Agari Data, Inc.Automated tracking of interaction with a resource of a message
US20180089224A1 (en)*2016-09-292018-03-29Hewlett Packard Enterprise Development LpTiering data blocks to cloud storage systems
US10009412B1 (en)*2017-02-092018-06-26International Business Machines CorporationDistributed file transfer with high performance
US10503904B1 (en)*2017-06-292019-12-10Fireeye, Inc.Ransomware detection and mitigation
US20190007198A1 (en)*2017-07-032019-01-03Thomson LicensingTransfer of content in a peer-to-peer network
US20190109870A1 (en)*2017-09-142019-04-11Commvault Systems, Inc.Ransomware detection and intelligent restore
US20190179804A1 (en)*2017-12-122019-06-13Interset Software, Inc.Tracking file movement in a network environment
US20200134051A1 (en)*2018-10-312020-04-30EMC IP Holding Company LLCDual layer deduplication for application specific file types in an information processing system
US20200145499A1 (en)*2018-11-062020-05-07Dropbox, Inc.Technologies for integrating cloud content items across platforms
US11381587B2 (en)*2019-01-202022-07-05Helios Data Inc.Data segmentation
US20200293408A1 (en)*2019-03-122020-09-17Commvault Systems, Inc.Managing structured data in a data storage system
US20200364370A1 (en)*2019-05-142020-11-19Google LlcAutomatically detecting unauthorized re-identification
US11425205B1 (en)*2019-07-162022-08-23Whatsapp Inc.Methods and systems for transmitting an image in chunks
US20210064238A1 (en)*2019-08-302021-03-04Hewlett Packard Enterprise Development LpData integrity verification
US11277467B1 (en)*2019-09-302022-03-15Cadence Design Systems, Inc.Method, system, and product for orchestrating uploads of very large design files to selected cloud providers in a multi-cloud arrangement
US20210211407A1 (en)*2020-01-072021-07-08Palantir Technologies Inc.Automated syncing of data between security domains
US20210227022A1 (en)*2020-01-202021-07-22International Business Machines CorporationMedia obfuscation
US20210234872A1 (en)*2020-01-282021-07-29Rubrik, Inc.Malware protection for virtual machines
US20210320941A1 (en)*2020-04-102021-10-14AttackIQ, Inc.Method for emulating a known attack on a target computer network
US20200322287A1 (en)*2020-06-182020-10-08Intel CorporationSwitch-managed resource allocation and software execution
US20210400060A1 (en)*2020-06-182021-12-23Peter ChackoSystem and methods for storage intrusion mitigation with data transport overlay tunnels and secure vaulting
US20210400106A1 (en)*2020-06-192021-12-23Microsoft Technology Licensing, LlcPredictive model application for file upload blocking determinations
US20220012336A1 (en)*2020-07-102022-01-13International Business Machines CorporationBlock-based anomaly detection
US20220070223A1 (en)*2020-08-312022-03-03Palo Alto Networks, Inc.Security platform with external inline processing of assembled selected traffic
US20220078236A1 (en)*2020-09-102022-03-10EMC IP Holding Company LLCMultipart upload for distributed file systems
US20220083509A1 (en)*2020-09-162022-03-17Citrix Systems, Inc.File transfer systems and methods
US20220116406A1 (en)*2020-10-122022-04-14Microsoft Technology Licensing, LlcMalware detection and mitigation via a forward proxy server
US20220201034A1 (en)*2020-12-172022-06-23International Business Machines CorporationContext-based simulation of content
US11451569B1 (en)*2021-04-172022-09-20Arbor Networks, Inc.File extraction from network data to artifact store files and file reconstruction
US20230199017A1 (en)*2021-12-222023-06-22Peter ChackoZero trust data castle system with security operation methods for active response
US12143389B1 (en)*2022-02-042024-11-12Wells Fargo Bank, N.A.3rd party data explorer
US20230259382A1 (en)*2022-02-162023-08-17Sysdig, Inc.Configuring metric collection based on application information
US11663336B1 (en)*2022-04-062023-05-30Dell Products L.P.Block-based protection from ransomware
US11755733B1 (en)*2022-04-062023-09-12Dell Products L.P.Identifying ransomware host attacker
US20230421562A1 (en)*2022-05-192023-12-28Capital One Services, LlcMethod and system for protection of cloud-based infrastructure
US20230403318A1 (en)*2022-06-142023-12-14Nvidia CorporationDifferential data transfer using congestion control
US20230412693A1 (en)*2022-06-152023-12-21Microsoft Technology Licensing, LlcNetwork-aware endpoint data loss prevention for web transactions
US20230412669A1 (en)*2022-06-152023-12-21Microsoft Technology Licensing, LlcSelf-driven adaptive upload

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
Chen, et al., "Filtering for Malice Through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level", 18th International Conference, Austin, TX, USA, Sep. 24-27, 2015; Lecture Notes in Computer Science, Springer, 25 pages.
Deng, "Computer Multimedia Network File Transfer Security Protection System", Transactions on Computer Science and Technology, vol. 7(1), 4 pages, 2019.
Gupta, "Survey on Security Issues in File Management in Cloud Computing Environment", arXiv:1505.00729, 5 pages, May 4, 2015.
PCT Application No. PCT/US2024/013115, International Search Report mailed Jun. 4, 2024, 4 pages.
PCT Application No. PCT/US2024/013115, Written Opinion mailed Jun. 4, 2024, 8 pages.

Also Published As

Publication numberPublication date
WO2024173021A1 (en)2024-08-22
CN120693841A (en)2025-09-23
US20240283775A1 (en)2024-08-22

Similar Documents

PublicationPublication DateTitle
US12003517B2 (en)Enhanced cloud infrastructure security through runtime visibility into deployed software
US11082436B1 (en)System and method for offloading packet processing and static analysis operations
US9100291B2 (en)Systems and methods for extracting structured application data from a communications link
US8693348B1 (en)Systems and methods for content type classification
US9356844B2 (en)Efficient application recognition in network traffic
US11824834B1 (en)Distributed firewall that learns from traffic patterns to prevent attacks
US20150156183A1 (en)System and method for filtering network communications
CN110719215B (en)Flow information acquisition method and device of virtual network
CN105122727A (en)Systems and methods for detecting and mitigating threats to a structured data storage system
WO2016082371A1 (en)Ssh protocol-based session parsing method and system
US20110038378A1 (en)Techniques for using the network as a memory device
CN100521679C (en)Sensitive information filter system and method for server up transfer file
US11616759B2 (en)Increased coverage of application-based traffic classification with local and cloud classification services
US20140068761A1 (en)Abuse identification of front-end based services
US12407651B2 (en)Inline inspection cybersecurity enforcement of multipart file transmissions
US11057324B1 (en)System and method of secure analysis for encrypted electronic mail attachments
KR20250150583A (en) Implementing inline cybersecurity inspection of multipart file transmissions
KR102695897B1 (en)Electronic apparatus and method for analyzing traffic thereby
US11949658B2 (en)Increased coverage of application-based traffic classification with local and cloud classification services
US20250211570A1 (en)Route adaptive intelligent traffic offloading
WO2025132775A1 (en)Endpoint agent and related cybersecurity infrastructure
CN117857066A (en)Virus transmission interception method and device based on session, electronic equipment and medium
CN116506422A (en) File identification method, device, equipment and medium based on breakpoint resume
CN119603022A (en) A method and device for controlling access to POP3 mail protocol
CN119603309A (en) Message processing method, network processing device and computer readable storage medium

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:PALO ALTO NETWORKS, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:XIAO, ZIHANG;SUN, LEXUAN;JIANG, MENGYING;AND OTHERS;SIGNING DATES FROM 20230208 TO 20230215;REEL/FRAME:062720/0528

FEPPFee payment procedure

Free format text:ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPPInformation on status: patent application and granting procedure in general

Free format text:AWAITING TC RESP, ISSUE FEE PAYMENT RECEIVED

STPPInformation on status: patent application and granting procedure in general

Free format text:AWAITING TC RESP, ISSUE FEE PAYMENT VERIFIED

STPPInformation on status: patent application and granting procedure in general

Free format text:PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCFInformation on status: patent grant

Free format text:PATENTED CASE


[8]ページ先頭

©2009-2025 Movatter.jp